Question

-Prepare a list of Hardware and Software Pre-requisites for the server installation -Complete the server installation...

-Prepare a list of Hardware and Software Pre-requisites for the server installation

-Complete the server installation – Explain the role of the server in the network

-Define a password policy for Administrator account

0 0
Add a comment Improve this question Transcribed image text
Answer #1

`Hey,

Note: Brother if you have any queries related the answer please do comment. I would be very happy to resolve all your queries.

The function of a computer server is to store, retrieve and send computer files and data to other computers on a network. Many businesses use a local network to connect a number of computers. On a larger scale, the worldwide computer network known as the Internet depends on a large number of servers located around the world. The files, data and functionality of a given website is based on servers.

Servers have more processing power, memory and storage than their client computers. The client is the computer that is not acting as the server and is requesting information from the server. When computers are connected in some physical or wireless way and sharing services or information, this is referred to as a computer network. A computer network requires at least two participants, with at least one of them acting as a client and at least one acting as a server.Numerous systems use this client-server networking model, including websites and email services. An alternative model, peer-to-peer networking, enables all computers to act as either a server or a client. Hardware requirements for servers vary depending on the server applications and the number of clients. Servers run for long periods without interruption, so hardware reliability and durability are extremely important. Servers are noisy and need a stable power supply, good Internet access and increased security, so they are usually stored in a dedicated server room or center.

Require Passwords for Login - Systems shall not be configured to allow user login without a password. Exceptions shall be granted for specialized devices such as public access kiosks when these devices are configured with public user accounts that have extremely restricted permissions (e.g. web only) that are separate from administrative accounts.

Protect Against Password Hacking - System administrators shall harden their systems to deter password cracking by using reasonable methods to mitigate “brute force” password attacks. For example, some systems will lock an account for a few minutes after several failed login attempts, or detect where the attack is coming from and block further attempts from that location, or at minimum alert an alert in real-time that an attack is underway so that manual action can be taken.

Logging - Practicable measures shall be put in place to log successful and failed login attempts.

Changing Password after Compromise or Disclosure - System administrators shall, in a timely manner, reset passwords for user accounts or require users to reset their own passwords in situations where continued use of a password creates risk of unauthorized access to the computing account or resource. Examples of these situations include but are not limited to: disclosure of a password to an unauthorized person; discovery of a password by unauthorized person; system compromise (unauthorized access to a system or account); insecure transmission of a password; replacing the user of an account with another individual requiring access to the same account; password is provided to IT support staff in order to resolve a technical issue; account password is communicated to a user by the system administrator.

Default Passwords - System administrators shall not use default passwords for administrative accounts.

Kindly revert for any queries

Thanks.

Add a comment
Know the answer?
Add Answer to:
-Prepare a list of Hardware and Software Pre-requisites for the server installation -Complete the server installation...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 1 Assume you are working for Green Energy as a network administrator. The manager requests...

    Question 1 Assume you are working for Green Energy as a network administrator. The manager requests you to develop a network security policy. You consider writing a guideline on securing access to network data by setting up authentication and authorisation and configuring password requirements. a. Explain what authentication and authorisation are, and b. Give at least three recommendations to users on selecting a good password. Question 2 living/working/studying environmentsby collecting and demonstrating the data of temperature, humidity, air quality and...

  • B1) List the benefits of networking. B2) List the responsibilities of a network administrator. B3) What...

    B1) List the benefits of networking. B2) List the responsibilities of a network administrator. B3) What is a local area network? B4) Define the following terms: (i) Point to Point link (ii) Topology (iii) MAC B5) What is a wide area network? B6) List the advantages of a peer to peer network. B7) List the advantages of a client/server network. B8) List the disadvantages of a peer to peer network. B9) Briefly explain client program and server program.

  • Complete the hardening and auditing tasks using a personal computer with the default installation of Windows...

    Complete the hardening and auditing tasks using a personal computer with the default installation of Windows 7 or Windows 10. Provide screenshots of all screens and queries made. Ensure that you are logged in as an administrator. Using a computer that has Windows 7 or Windows 10 installed: Review the antivirus program. Ensure that it is up to date, is configured for automatic updates, and is scheduled to run quick scans regularly. Note when the last full system scan was...

  • Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as...

    Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as files and hardware. 2. A(n). is a logical grouping of users and equipment as defined by the network administrator. 3. Microsoft server editions have interfaces similar to the current was new for Windows Server 2008 and Windows 7 and is designed to improve network performance by storing information downloaded from the Internet or a web server onto a local area network client. 5. An...

  • We are a new start-up company with five to eight employees. I know we need a...

    We are a new start-up company with five to eight employees. I know we need a server and office network. We need software to create animations and apps. And we want to get our own website. I've looked online at different servers this has only made choosing one even harder. We are lost, I guess what we need is a simple server for our accounting software, shared files, and e-mail/Internet. Please be as specific as possible on the specs. We...

  • CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Question 58 + 66-70 (6 Questions)...

    CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Question 58 + 66-70 (6 Questions) Question 58. Which among the following are the best practices for enhancing Disk FT? Select one or more: a. Verify hardware and firmware components b. Retain some un-allocated space c. Replace failed disk immediately d. Design complete FT storage pool Question 66. What are Group Policy Objects? Select one: a. Collection of settings that define what a system will look like and how it...

  • 1. Define Structure UNIT as described in the list: ınit char codease complete the question int...

    1. Define Structure UNIT as described in the list: ınit char codease complete the question int numberOfCreditHours int semester int numberOfPreReq; pointer to number of pre-requisites eg:like char preRequisite[numberOfPreReq][10]; char* preReq int numberOfPostReq; pointer to number of post-requisites eg:like char postRequisite[numberOfPostReq] [1 0]; char* postReq NOTE: this is a BIG question and has to be asked seperately, answering only one question here. pluginfile.php/94428/mod resource/content/1/lab 6202 %20 %28file %20and%20parsing % 29.pdf Expected C++Skills to finish this activity Simple data types C++...

  • Part - Web Server Setup and Demonstration (AJ Objective The objective of this assignment is to...

    Part - Web Server Setup and Demonstration (AJ Objective The objective of this assignment is to some HTTP as application layer protocol and TCP as reliable transport layer protocol HTTP is carried by TCP. Also, in the assignment you will investigate the working of client-server mechanism from both application and networking perspective There are several different ways to setup an HTTP server, including through Apache Tomcat, Apache Glassfish that integrales in an IDE such as Eclipse/NetBeans or even a browser...

  • Some restaurants use customer checks with pre-numbered sequence codes. Each food server uses these checks to...

    Some restaurants use customer checks with pre-numbered sequence codes. Each food server uses these checks to write up customer orders. Food servers are told not to destroy any customer checks; if a mistake is made, they are to void that check and write a new one. All voided checks are to be turned in to the manager daily. How does this policy help the restaurant control cash receipts? Do you think there is a more efficient way to control cash...

  • Some restaurants use customer checks with pre-numbered sequence codes. Each food server uses these checks to...

    Some restaurants use customer checks with pre-numbered sequence codes. Each food server uses these checks to write up customer orders. Food servers are told not to destroy any customer checks; if a mistake is made, they are to void that check and write a new one. All voided checks are to be turned in to the manager daily. How does this policy help the restaurant control cash receipts? Do you think there is a more efficient way to control cash...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT